SlideShare a Scribd company logo
YOU CAN’T STOP
A BREACH.
NOW WHAT?!?
“Begin with the end in mind.”
~Stephen Covey
“You couldn't know what you didn't know,
but now you know.” ~Yogi Berra
PRESENTERS
Nate Latessa
Heureka Chief Operating Officer
nate.latessa@heurekasoftware.com
Stephen Marchewitz
VP Client Solutions
Stephen.marchewitz@heurekasoftware.com
HEUREKA OVERVIEW
Heureka
Meaning: “I’ve found it!”
Heureka was formed to allow
clients to search and respond
quickly to discovery, security,
compliance and free-form
investigation needs.
WHY?
There is a need for quick information regarding:
Breach
Lawsuit
HR Issues
BSA Licensing
Inquiry
Process Change
Lack of Planning
Excessive failed
logins undetected
Unpatched Endpoints
Forced to classify data
Unknown what's in the
cloud
Unknown IOC's
Intellectual Property
Loss
Failed Audit
Proof of compliance
HOW?
• Endpoint Intelligence
• Viewed via the search and
correlation platform
• Numerous workflows
– eDiscovery
– Data Classification
– Incident and Indicator Response
– Audit and Compliance
– Free Form Investigation
YOU CAN’T STOP A BREACH
Overview
• Security’s Strategic Change
• Resilience
• Reducing the Impact
• Reverse Engineering Your Plan of Action
“Enterprises have long over-spent on prevention and under-spent
on detection and response.” --Gartner
Verizon breach report shows:
– 80% RATED AS SIMPLE ATTACKS
– ⅔s WERE ACTIVE FOR MONTHS
BEFORE BEING DISCOVERED.
PHASES OF A BREACH
•Controls
•Hardening
•Enforcement
BEFORE
• Detect
• Block
• Defend
DURING
• Scope
• Contain
• Remediate
AFTER
SPENDING BEFORE KNOWN BREACH
•$$$$$$$$$$BEFORE
•$$$$DURING
•$AFTER
SPENDING SHIFT POST-BREACH
•$$$$$$$$BEFORE
•$$$$$DURING
•$$$$AFTER
A 20% increase in spending after a breach,
disproportionally in forensic and investigative tools.
--Ponemon
WHILE WE CAN’T STOP A
BREACH…
Can we realistically contain it?
RESILIENT
Patterned After Nature
You have to be
WHAT WILL IT TAKE?
• Increasing the speed and accuracy of
security response actions during an attack
• Effective and adaptive plans and processes
to identify and remediate security breaches
after they have occurred
- SANS report 2014
THE MOVE FROM PREVENTION
Respond
Detect
Prevent
IMPACT REDUCING EFFORTS
• Data Classification
• Granular Audits
• Solid Proactive Processes
• Anomaly Detection
• Policies and Procedures
• Incident Identification and Remediation
• Patching Process
NEED FOR PLANNING
• Incident Response Plan
• Data Classification Plan
• Audit Plan
• Risk Management Plan
• Business Impact Analysis
• Business Continuity Plan
• Patch Plan
– And Everything Must be a Process!
YET PLANS TAKE TIME AND RESOURCES
• Again, after a breach, spending only goes up 20%.
Corporations (on average) have
• No patience ( yet lack speed)
• Not enough resources (yet incomplete planning)
Starting with a conceptual plan doesn’t work (easily) in
practice
REVERSE ENGINEERING
It’s too difficult to forward engineer in
today’s environment.
Data Data
THE FIVE KEYS TO REVERSE
ENGINEERING
1. Determine the most basic level what happened (or
could), what you have, and where it is—(i.e. malware,
data, files, systems, network traffic, etc).
2. Define the problem
3. Identify as many steps as possible that are required to
resolve the issue.
4. Define the tools and resources needed to get the job
done.
5. Create the policies and procedures based on those
steps and resources.
BENEFITS OF REVERSE ENGINEERING
• Starting with a blank canvas is too difficult
• Systematically identifies areas to improve
• Provides a baseline for making changes
and testing them
• Helps assess performance and provides a
basis for making improvements.
IDEAL INCIDENT RESPONSE
Goals
• Risks and Impacts
• Classify
Plan
• Policies
• Procedures
Discover
• Scope
• Validate
Contain
• Prioritize
• Group
Eradicate
• Correlate
• Cleanse
Recover
• Resolve Collateral Issues
• Improve
REVERSE ENGINEERED IR
Discover
• Scope
• Validate
Contain
• Prioritize
• Group
Eradicate
• Correlate
• Cleanse
Recover
• Resolve Collateral Issues
• Improve
Goals
• Risks and Impacts
• Classify
Plan
• Policies
• Procedures
DISCOVERY IS KEY
What do we have? Where is it? Who owns it?
What’s happening now? Where should we start?
This is critical for many issues
• Incident Response
• Compliance
• Data Classification
• Intellectual Property Loss
• Lawsuits
• Etc.
SUMMARY
• You’re breached
• Ensure you ‘know what you know.’
• The ideal doesn’t work in practice
• Begin with the end in mind –Resilience is key
• Have your tools and processes reflect this
fact
• Start from where you are to reduce impact
and collateral risk issues
THANK YOU!
HEUREKA – I’VE FOUND IT!
www.heurekasoftware.com

More Related Content

What's hot

Twelve Risks to Enterprise Software Projects-And What to Do About Them
Twelve Risks to Enterprise Software Projects-And What to Do About ThemTwelve Risks to Enterprise Software Projects-And What to Do About Them
Twelve Risks to Enterprise Software Projects-And What to Do About Them
TechWell
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
Mike Spaulding
 
One hundred rules for nasa project managers
One hundred rules for nasa project managersOne hundred rules for nasa project managers
One hundred rules for nasa project managers
Andreea Mocanu
 
Brighttalk high scale low touch and other bedtime stories - final
Brighttalk   high scale low touch and other bedtime stories - finalBrighttalk   high scale low touch and other bedtime stories - final
Brighttalk high scale low touch and other bedtime stories - final
Andrew White
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
centralohioissa
 
Bill Lisse - Communicating Security Across the C-Suite
Bill Lisse - Communicating Security Across the C-SuiteBill Lisse - Communicating Security Across the C-Suite
Bill Lisse - Communicating Security Across the C-Suite
centralohioissa
 

What's hot (6)

Twelve Risks to Enterprise Software Projects-And What to Do About Them
Twelve Risks to Enterprise Software Projects-And What to Do About ThemTwelve Risks to Enterprise Software Projects-And What to Do About Them
Twelve Risks to Enterprise Software Projects-And What to Do About Them
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
One hundred rules for nasa project managers
One hundred rules for nasa project managersOne hundred rules for nasa project managers
One hundred rules for nasa project managers
 
Brighttalk high scale low touch and other bedtime stories - final
Brighttalk   high scale low touch and other bedtime stories - finalBrighttalk   high scale low touch and other bedtime stories - final
Brighttalk high scale low touch and other bedtime stories - final
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
 
Bill Lisse - Communicating Security Across the C-Suite
Bill Lisse - Communicating Security Across the C-SuiteBill Lisse - Communicating Security Across the C-Suite
Bill Lisse - Communicating Security Across the C-Suite
 

Similar to Heureka Webinar - Increase Resilience and Reduce the Impact of a Breach

Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery ProfessionalsHeureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Software
 
Applying TQM and the Toyota Production System in Development of Software Arti...
Applying TQM and the Toyota Production System in Development of Software Arti...Applying TQM and the Toyota Production System in Development of Software Arti...
Applying TQM and the Toyota Production System in Development of Software Arti...
Dave Litwiller
 
Data Governance: Why, What & How
Data Governance: Why, What & HowData Governance: Why, What & How
Data Governance: Why, What & How
Senturus
 
Defect Metrics for Organization and Project Health
Defect Metrics for Organization and Project HealthDefect Metrics for Organization and Project Health
Defect Metrics for Organization and Project Health
Josiah Renaudin
 
Computer Applications and Systems - Workshop IV
Computer Applications and Systems - Workshop IVComputer Applications and Systems - Workshop IV
Computer Applications and Systems - Workshop IV
Raji Gogulapati
 
Security and DevOps Overview
Security and DevOps OverviewSecurity and DevOps Overview
Security and DevOps Overview
Adrian Sanabria
 
You've Got No UI?! (Agile Data Teams)
You've Got No UI?! (Agile Data Teams)You've Got No UI?! (Agile Data Teams)
You've Got No UI?! (Agile Data Teams)
Mark Barber
 
Code Yellow: Helping operations top-heavy teams the smart way
Code Yellow: Helping operations top-heavy teams the smart wayCode Yellow: Helping operations top-heavy teams the smart way
Code Yellow: Helping operations top-heavy teams the smart way
Michael Kehoe
 
WTF is Penetration Testing
WTF is Penetration TestingWTF is Penetration Testing
WTF is Penetration Testing
Scott Sutherland
 
Code Yellow: Helping Operations Top-Heavy Teams the Smart Way
Code Yellow: Helping Operations Top-Heavy Teams the Smart WayCode Yellow: Helping Operations Top-Heavy Teams the Smart Way
Code Yellow: Helping Operations Top-Heavy Teams the Smart Way
Todd Palino
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
rkadayam
 
Assessment Project Management in the Real World - Hour Three
Assessment Project Management in the Real World - Hour ThreeAssessment Project Management in the Real World - Hour Three
Assessment Project Management in the Real World - Hour Three
Jen Rutner
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
Shannon Lietz
 
DevSecCon Keynote
DevSecCon KeynoteDevSecCon Keynote
DevSecCon Keynote
Shannon Lietz
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
Shannon Lietz
 
Alphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster Recovery
Alphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster RecoveryAlphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster Recovery
Alphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster Recovery
Internetwork Engineering (IE)
 
Engineering Teams and Systems for Velocity
Engineering Teams and Systems for VelocityEngineering Teams and Systems for Velocity
Engineering Teams and Systems for Velocity
Jean Barmash
 
Building enterprise platforms - off the beaten path - SharePoint User Group U...
Building enterprise platforms - off the beaten path - SharePoint User Group U...Building enterprise platforms - off the beaten path - SharePoint User Group U...
Building enterprise platforms - off the beaten path - SharePoint User Group U...
Andy Talbot
 
Measuring Data Quality with DataOps
Measuring Data Quality with DataOpsMeasuring Data Quality with DataOps
Measuring Data Quality with DataOps
Steven Ensslen
 
Helping operations top-heavy teams the smart way
Helping operations top-heavy teams the smart wayHelping operations top-heavy teams the smart way
Helping operations top-heavy teams the smart way
Michael Kehoe
 

Similar to Heureka Webinar - Increase Resilience and Reduce the Impact of a Breach (20)

Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery ProfessionalsHeureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
 
Applying TQM and the Toyota Production System in Development of Software Arti...
Applying TQM and the Toyota Production System in Development of Software Arti...Applying TQM and the Toyota Production System in Development of Software Arti...
Applying TQM and the Toyota Production System in Development of Software Arti...
 
Data Governance: Why, What & How
Data Governance: Why, What & HowData Governance: Why, What & How
Data Governance: Why, What & How
 
Defect Metrics for Organization and Project Health
Defect Metrics for Organization and Project HealthDefect Metrics for Organization and Project Health
Defect Metrics for Organization and Project Health
 
Computer Applications and Systems - Workshop IV
Computer Applications and Systems - Workshop IVComputer Applications and Systems - Workshop IV
Computer Applications and Systems - Workshop IV
 
Security and DevOps Overview
Security and DevOps OverviewSecurity and DevOps Overview
Security and DevOps Overview
 
You've Got No UI?! (Agile Data Teams)
You've Got No UI?! (Agile Data Teams)You've Got No UI?! (Agile Data Teams)
You've Got No UI?! (Agile Data Teams)
 
Code Yellow: Helping operations top-heavy teams the smart way
Code Yellow: Helping operations top-heavy teams the smart wayCode Yellow: Helping operations top-heavy teams the smart way
Code Yellow: Helping operations top-heavy teams the smart way
 
WTF is Penetration Testing
WTF is Penetration TestingWTF is Penetration Testing
WTF is Penetration Testing
 
Code Yellow: Helping Operations Top-Heavy Teams the Smart Way
Code Yellow: Helping Operations Top-Heavy Teams the Smart WayCode Yellow: Helping Operations Top-Heavy Teams the Smart Way
Code Yellow: Helping Operations Top-Heavy Teams the Smart Way
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
 
Assessment Project Management in the Real World - Hour Three
Assessment Project Management in the Real World - Hour ThreeAssessment Project Management in the Real World - Hour Three
Assessment Project Management in the Real World - Hour Three
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
 
DevSecCon Keynote
DevSecCon KeynoteDevSecCon Keynote
DevSecCon Keynote
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
 
Alphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster Recovery
Alphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster RecoveryAlphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster Recovery
Alphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster Recovery
 
Engineering Teams and Systems for Velocity
Engineering Teams and Systems for VelocityEngineering Teams and Systems for Velocity
Engineering Teams and Systems for Velocity
 
Building enterprise platforms - off the beaten path - SharePoint User Group U...
Building enterprise platforms - off the beaten path - SharePoint User Group U...Building enterprise platforms - off the beaten path - SharePoint User Group U...
Building enterprise platforms - off the beaten path - SharePoint User Group U...
 
Measuring Data Quality with DataOps
Measuring Data Quality with DataOpsMeasuring Data Quality with DataOps
Measuring Data Quality with DataOps
 
Helping operations top-heavy teams the smart way
Helping operations top-heavy teams the smart wayHelping operations top-heavy teams the smart way
Helping operations top-heavy teams the smart way
 

Recently uploaded

socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
SOCRadar
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
Peter Muessig
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
VALiNTRY360
 
What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
aymanquadri279
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
GohKiangHock
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
TaghreedAltamimi
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative AnalysisOdoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Envertis Software Solutions
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 

Recently uploaded (20)

socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
 
What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative AnalysisOdoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 

Heureka Webinar - Increase Resilience and Reduce the Impact of a Breach

  • 1. YOU CAN’T STOP A BREACH. NOW WHAT?!?
  • 2. “Begin with the end in mind.” ~Stephen Covey “You couldn't know what you didn't know, but now you know.” ~Yogi Berra
  • 3. PRESENTERS Nate Latessa Heureka Chief Operating Officer nate.latessa@heurekasoftware.com Stephen Marchewitz VP Client Solutions Stephen.marchewitz@heurekasoftware.com
  • 4. HEUREKA OVERVIEW Heureka Meaning: “I’ve found it!” Heureka was formed to allow clients to search and respond quickly to discovery, security, compliance and free-form investigation needs.
  • 5. WHY? There is a need for quick information regarding: Breach Lawsuit HR Issues BSA Licensing Inquiry Process Change Lack of Planning Excessive failed logins undetected Unpatched Endpoints Forced to classify data Unknown what's in the cloud Unknown IOC's Intellectual Property Loss Failed Audit Proof of compliance
  • 6. HOW? • Endpoint Intelligence • Viewed via the search and correlation platform • Numerous workflows – eDiscovery – Data Classification – Incident and Indicator Response – Audit and Compliance – Free Form Investigation
  • 7. YOU CAN’T STOP A BREACH Overview • Security’s Strategic Change • Resilience • Reducing the Impact • Reverse Engineering Your Plan of Action
  • 8. “Enterprises have long over-spent on prevention and under-spent on detection and response.” --Gartner Verizon breach report shows: – 80% RATED AS SIMPLE ATTACKS – ⅔s WERE ACTIVE FOR MONTHS BEFORE BEING DISCOVERED.
  • 9. PHASES OF A BREACH •Controls •Hardening •Enforcement BEFORE • Detect • Block • Defend DURING • Scope • Contain • Remediate AFTER
  • 10. SPENDING BEFORE KNOWN BREACH •$$$$$$$$$$BEFORE •$$$$DURING •$AFTER
  • 11. SPENDING SHIFT POST-BREACH •$$$$$$$$BEFORE •$$$$$DURING •$$$$AFTER A 20% increase in spending after a breach, disproportionally in forensic and investigative tools. --Ponemon
  • 12. WHILE WE CAN’T STOP A BREACH… Can we realistically contain it?
  • 14. WHAT WILL IT TAKE? • Increasing the speed and accuracy of security response actions during an attack • Effective and adaptive plans and processes to identify and remediate security breaches after they have occurred - SANS report 2014
  • 15. THE MOVE FROM PREVENTION Respond Detect Prevent
  • 16. IMPACT REDUCING EFFORTS • Data Classification • Granular Audits • Solid Proactive Processes • Anomaly Detection • Policies and Procedures • Incident Identification and Remediation • Patching Process
  • 17. NEED FOR PLANNING • Incident Response Plan • Data Classification Plan • Audit Plan • Risk Management Plan • Business Impact Analysis • Business Continuity Plan • Patch Plan – And Everything Must be a Process!
  • 18. YET PLANS TAKE TIME AND RESOURCES • Again, after a breach, spending only goes up 20%. Corporations (on average) have • No patience ( yet lack speed) • Not enough resources (yet incomplete planning) Starting with a conceptual plan doesn’t work (easily) in practice
  • 19. REVERSE ENGINEERING It’s too difficult to forward engineer in today’s environment. Data Data
  • 20. THE FIVE KEYS TO REVERSE ENGINEERING 1. Determine the most basic level what happened (or could), what you have, and where it is—(i.e. malware, data, files, systems, network traffic, etc). 2. Define the problem 3. Identify as many steps as possible that are required to resolve the issue. 4. Define the tools and resources needed to get the job done. 5. Create the policies and procedures based on those steps and resources.
  • 21. BENEFITS OF REVERSE ENGINEERING • Starting with a blank canvas is too difficult • Systematically identifies areas to improve • Provides a baseline for making changes and testing them • Helps assess performance and provides a basis for making improvements.
  • 22. IDEAL INCIDENT RESPONSE Goals • Risks and Impacts • Classify Plan • Policies • Procedures Discover • Scope • Validate Contain • Prioritize • Group Eradicate • Correlate • Cleanse Recover • Resolve Collateral Issues • Improve
  • 23. REVERSE ENGINEERED IR Discover • Scope • Validate Contain • Prioritize • Group Eradicate • Correlate • Cleanse Recover • Resolve Collateral Issues • Improve Goals • Risks and Impacts • Classify Plan • Policies • Procedures
  • 24. DISCOVERY IS KEY What do we have? Where is it? Who owns it? What’s happening now? Where should we start? This is critical for many issues • Incident Response • Compliance • Data Classification • Intellectual Property Loss • Lawsuits • Etc.
  • 25. SUMMARY • You’re breached • Ensure you ‘know what you know.’ • The ideal doesn’t work in practice • Begin with the end in mind –Resilience is key • Have your tools and processes reflect this fact • Start from where you are to reduce impact and collateral risk issues
  • 27. HEUREKA – I’VE FOUND IT! www.heurekasoftware.com

Editor's Notes

  1. Pain Story – why Something bad happened. People are yelling You're in trouble and you need answers from across the enterprise...ASAP!
  2. In the aftermath of a breach, security spending increases by 20% and many make the decision to invest in forensic and investigative tool
  3. You have issues now, start there